Wei Yan

According to our database1, Wei Yan
  • authored at least 198 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication.
IEEE Trans. VLSI Syst., 2017

Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions.
IEEE Trans. Mob. Comput., 2017

PUF-Based Fuzzy Authentication Without Error Correcting Codes.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

A novel regularized concept factorization for document clustering.
Knowl.-Based Syst., 2017

A novel bi-subgroup adaptive evolutionary algorithm for optimizing degree of hybridization of HEV bus.
Cluster Computing, 2017

A Study of Power Supply Variation as a Source of Random Noise.
Proceedings of the 30th International Conference on VLSI Design and 16th International Conference on Embedded Systems, 2017

A design flow with integrated verification of requirements and faults in safety-critical systems.
Proceedings of the 12th System of Systems Engineering Conference, 2017

Robust semi-supervised concept factorization.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Risk assessment for oil&gas resource countries based on PCA-SVM model.
Proceedings of the 20th International Conference on Information Fusion, 2017

Detecting Java Code Clones with Multi-granularities Based on Bytecode.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Theoretical analysis on caching effects in urban vehicular ad hoc networks.
Wireless Communications and Mobile Computing, 2016

A Mixed Integer Programming Model for Supplier Selection and Order Allocation Problem with Fuzzy Multiobjective.
Scientific Programming, 2016

A fast recognition algorithm for suspicious behavior in high definition videos.
Multimedia Syst., 2016

A robust HLLC-type Riemann solver for strong shock.
J. Comput. Physics, 2016

A Decision-making Method for Active Remanufacturing Time Based on Environmental and Economic Indicators.
iJOE, 2016

Modelling on optimal portfolio with exchange rate based on discontinuous stochastic process.
Int. J. Control, 2016

A new approach for the capability analysis based on measurement system analysis: a case study for coal quality detection equipment.
IJADS, 2016

A Fast Non-Smooth Nonnegative Matrix Factorization for Learning Sparse Representation.
IEEE Access, 2016

Quantifying caching effects in urban VANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A Link Reliability Model of Metropolitan VANETs for Data Dissemination.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Trident: Context-Based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

An Optimization Algorithm for Heterogeneous Hadoop Clusters Based on Dynamic Load Balancing.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Optimal Scheduling Algorithm of MapReduce Tasks Based on QoS in the Hybrid Cloud.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

The Optimization of LRU Algorithm Based on Pre-Selection and Cache Prefetching of Files in Hybrid Cloud.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Robust hardware true random number generators using DRAM remanence effects.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

2015
Boosting named data networking for data dissemination in urban VANET scenarios.
Vehicular Communications, 2015

On the Security of Compressed Sensing-Based Signal Cryptosystem.
IEEE Trans. Emerging Topics Comput., 2015

A connectivity resilient dynamic multi-channel assignment method for VANET.
Security and Communication Networks, 2015

Finger-vein recognition with modified binary tree model.
Neural Computing and Applications, 2015

IngeniousTRIZ: An automatic ontology-based system for solving inventive problems.
Knowl.-Based Syst., 2015

Effect of Outdated Channel Estimates on Multiple Antennas Multiple Relaying Networks.
TIIS, 2015

Integrated internal truck, yard crane and quay crane scheduling in a container terminal considering energy consumption.
Expert Syst. Appl., 2015

Bricks vs. clicks: Which is better for marketing remanufactured products?
European Journal of Operational Research, 2015

Finger-vein pattern restoration with Direction-Variance-Boundary Constraint Search.
Eng. Appl. of AI, 2015

Investigation on remote monitoring system for hybrid electric bulldozer.
Comput. Syst. Sci. Eng., 2015

Remanufacturer-Manufacturer Collaboration in a Supply Chain: The Manufacturer Plays the Leader Role.
APJOR, 2015

A fast genetic algorithm for solving architectural design optimization problems.
AI EDAM, 2015

Knowledge centric service engineering for value chain management and sustainable network development.
Advanced Engineering Informatics, 2015

Yard crane scheduling in a container terminal for the trade-off between efficiency and energy consumption.
Advanced Engineering Informatics, 2015

Boosting named data networking for efficient packet forwarding in urban VANET scenarios.
Proceedings of the 2015 IEEE International Workshop on Local and Metropolitan Area Networks, 2015

Auction model for mass customization of logistics.
Proceedings of the IEEE First International Smart Cities Conference, 2015

A two-year survey on security challenges in automotive threat landscape.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

A Novel Way to Authenticate Untrusted Integrated Circuits.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Pilot-bus-centered automatic voltage control with high penetration level of wind generation.
Proceedings of the 2015 IEEE Industry Applications Society Annual Meeting, 2015

The Hidden Fine-Grained State Machine in Cellular Network for Simultaneous Voice and Data Services.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Coordinated Resource Management for Large Scale Interactive Data Query Systems.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
(Meta)Knowledge modeling for inventive design. (Modélisation des (méta)connaissances pour la conception inventive).
PhD thesis, 2014

Designing contracts for a closed-loop supply chain under information asymmetry.
Oper. Res. Lett., 2014

A robust and contact resolving Riemann solver on unstructured mesh, Part II, ALE method.
J. Comput. Physics, 2014

A robust and contact resolving Riemann solver on unstructured mesh, Part I, Euler method.
J. Comput. Physics, 2014

Oil supply between OPEC and non-OPEC based on game theory.
Int. J. Systems Science, 2014

Dynamic rolling-horizon strategy for the electric trolley scheduling in frame bridge-based automated container terminals based on Hungarian algorithm.
IJCAT, 2014

An ontology-based approach for using physical effects in inventive design.
Eng. Appl. of AI, 2014

An ontology-based approach for inventive problem solving.
Eng. Appl. of AI, 2014

FKG.js: A Plug-in Based on Freebase for a Knowledge Card Service.
Proceedings of the 2014 10th International Conference on Semantics, 2014

Simulation and Evaluation of Decentralized SPARQL Query Processing.
Proceedings of the International Conference on Identification, 2014

DA2RF: A data aggregation algorithm by restricting forwarders for VANETs.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Sober-Drive: A smartphone-assisted drowsy driving detection system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

A modification on the Chord finger table for improving search efficiency.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

Simulation of a Semantic Web data sharing system based on NS-3.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
An Algorithm for Vein Matching Based on Log-polar Transform.
Smart CR, 2013

Finger Vein Representation by Modified Binary Tree Model.
Smart CR, 2013

Sitting and sizing of aggregator controlled park for plug-in hybrid electric vehicle based on particle swarm optimization.
Neural Computing and Applications, 2013

Facilitating the resolution of inventive problems using semantic relatedness and ontology reasoning.
KES Journal, 2013

Ontology matching for facilitating inventive design based on semantic similarity and case-based reasoning.
KES Journal, 2013

An Algorithm for smoke RoF Detection Based on Surveillance Video.
Journal of Circuits, Systems, and Computers, 2013

A Class of Numerical Algorithm for Impact Degree Assessment of Emergency Systems.
J. Applied Mathematics, 2013

A formal ontology for a generalized inventive design methodology.
Applied Ontology, 2013

A simulation optimization method for internal trucks sharing assignment among multiple container terminals.
Advanced Engineering Informatics, 2013

GAMLL: Gateway Assisted Multicast Algorithm Towards Low Latency for Wireless Mesh Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

On the cascading spectrum contention problem in self-coexistence of cognitive radio networks.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

A New Method of Using Physical Effects in Su-field Analysis based on Ontology Reasoning.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

Scalable load balancing for mapreduce-based record linkage.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Queue reorganization for subscription congestion avoidance in publish/subscribe systems.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Is Environmental Innovation Worth It? The Case of the Civil Aviation Industry of Emerging Markets.
Proceedings of the Advances in Production Management Systems. Sustainable Production and Service Supply Chains, 2013

Word of Mouth in Hospitality Management: The Case of Luxury Hotels in China.
Proceedings of the Advances in Production Management Systems. Sustainable Production and Service Supply Chains, 2013

Queue Reorganization for Subscription Congestion Avoidance in Publish/Subscribe Systems.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET.
Proceedings of the Frontiers in Internet Technologies, 2013

TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications.
Proceedings of the Frontiers in Internet Technologies, 2013

A road based multi-channel assignment method for VANET.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

LCS-MANET: A mobile storage architecture with location centric storage algorithm in manets.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Rate adaptation based on inherent frame delivery ratio for wireless networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Scalable and robust key group size estimation for reducer load balancing in MapReduce.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

2012
Ionospheric Electron Concentration Imaging Using Combination of LEO Satellite Data With Ground-Based GPS Observations Over China.
IEEE Trans. Geoscience and Remote Sensing, 2012

NCSWT: An integrated modeling and simulation tool for networked control systems.
Simulation Modelling Practice and Theory, 2012

Anti-virus in-the-cloud service: are we ready for the security evolution?
Security and Communication Networks, 2012

Driver's Face Detection Using Space-time Restrained Adaboost Method.
TIIS, 2012

Continuous-time safety-first portfolio selection with jump-diffusion processes.
Int. J. Systems Science, 2012

A class of multi-period semi-variance portfolio for petroleum exploration and development.
Int. J. Systems Science, 2012

Continuous-time mean-variance portfolio selection with value-at-risk and no-shorting constraints.
Int. J. Control, 2012

A method for evaluating environmental performance of machining systems.
Int. J. Computer Integrated Manufacturing, 2012

"Bricks vs. Clicks": The impact of manufacturer encroachment with a dealer leasing and selling of durable goods.
European Journal of Operational Research, 2012

A quality-time-cost-oriented strategy for product conceptualization.
Advanced Engineering Informatics, 2012

A Heuristic TRIZ Problem Solving Approach based on Semantic Relatedness and Ontology Reasoning.
Proceedings of the Advances in Knowledge-Based and Intelligent Information and Engineering Systems, 2012

Consumer-Oriented Product Conceptualization via a Web-Based Data Mining Approach.
Proceedings of the Concurrent Engineering Approaches for Sustainable Product Development in a Multi-Disciplinary Environment, 2012

Customer Requirements Elicitation and Management for Product Conceptualization.
Proceedings of the Concurrent Engineering Approaches for Sustainable Product Development in a Multi-Disciplinary Environment, 2012

Modeling of Electromagnetic Interference Noise Mechanism for Magneto-Rheological Damper.
Proceedings of the Intelligent Robotics and Applications - 5th International Conference, 2012

CAS: A framework of online detecting advance malware families for cloud-based security.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Integrated simulation and emulation platform for cyber-physical system security experimentation.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

SENTINEL: securing database from logic flaws in web applications.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Modeling of Dimmable Fluorescent Lamp Including the Tube Temperature Effects.
IEEE Trans. Industrial Electronics, 2011

Evolving robust GP solutions for hedge fund stock selection in emerging markets.
Soft Comput., 2011

Special issue on Bio-inspired Learning and Intelligent Systems for Security (BLISS-07).
Soft Comput., 2011

The Cauchy problem for the modified Kawahara equation in Sobolev spaces with low regularity.
Mathematical and Computer Modelling, 2011

Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction.
J. Network and Computer Applications, 2011

A Fast and Robust Algorithm for Fighting Behavior Detection Based on Motion Vectors.
TIIS, 2011

Automated Ranking of Relaxing Query Results Based on XML Structure and Content Preferences.
IJSSOE, 2011

A functional-commercial analysis strategy for product conceptualization.
Expert Syst. Appl., 2011

Curve fitting and optimal interpolation on CNC machines based on quadratic B-splines.
SCIENCE CHINA Information Sciences, 2011

An investigation into knowledge-based yard crane scheduling for container terminals.
Advanced Engineering Informatics, 2011

Engineering informatics in port operations and logistics.
Advanced Engineering Informatics, 2011

Developing a dynamic rolling-horizon decision strategy for yard crane scheduling.
Advanced Engineering Informatics, 2011

Quantitative Analysis of the VANET Connectivity: Theory and Application.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Matching of Different Abstraction Level Knowledge Sources: The Case of Inventive Design.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011

Skyline Adaptive Fuzzy Query.
Proceedings of the Knowlege-Based and Intelligent Information and Engineering Systems, 2011

Power Allocation for Bidirectional AF Relaying with Direct Link over Rayleigh Fading Environment.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Relative Link Quality Assessment and Hybrid Routing Scheme for Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2011

An Application of Semantic Distance between Short Texts to Inventive Design.
Proceedings of the KEOD 2011, 2011

The automatic detection of artifacts in Magnetoencephalographic signals based on fast ICA.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

VM Co-scheduling: Approximation of Optimal Co-scheduling in Data Center.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Behavior of viscous solutions in Lagrangian formulation.
J. Comput. Physics, 2010

Numerical solution of continuous-time mean-variance portfolio selection with nonlinear constraints.
Int. J. Control, 2010

Reliable Multicast with Network Coding in Lossy Wireless Networks.
IJCNS, 2010

Relaxing Queries Based on XML Structure and Content Preferences.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

MI-VANET: A New Mobile Infrastructure Based VANET Architecture for Urban Environment.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Research on Reverse Engineering from Formal Models to UML Models.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

Algorithms for Random Adjacency Matrixes Generation Used for Scheduling Algorithms Test.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

A Strategy for Customer-Oriented Human-Centric Product Conceptualization.
Proceedings of the New World Situation: New Directions in Concurrent Engineering, 2010

Cross-layer optimal policies for stochastic reliable transmission in Wireless Sensor Networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

Generalized synchronization control of discrete-time chaotic systems.
Proceedings of the Sixth International Conference on Natural Computation, 2010

The Optimized Reinforcement Learning Approach to Run-Time Scheduling in Data Center.
Proceedings of the GCC 2010, 2010

A Hybrid Modeling Approach to Microarchitecture Design Space Exploring.
Proceedings of the GCC 2010, 2010

Registration and Private Key Distribution Protocol Based on IBE.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Reconstructing the Music Hall Rotunda and Annex at Vauxhall Pleasure Gardens c. 1764.
Proceedings of the Electronic Visualisation and the Arts, 2010

2009
Metrics and Algorithms for Scheduling of Data Dissemination in Mesh Units Assisted Vehicular Networks.
Wireless Sensor Network, 2009

Energy Saving of Large-Scale High-Intensity-Discharge Lamp Lighting Networks Using a Central Reactive Power Control System.
IEEE Trans. Industrial Electronics, 2009

Research on Real-Time Mobile 3D Topography System.
JNW, 2009

Futures price modeling under exchange rate volatility and its multi-period semi-variance portfolio selection.
Int. J. Systems Science, 2009

A class of continuous-time portfolio selection with liability under jump-diffusion processes.
Int. J. Control, 2009

Evaluation of two-dimensional ZK-MEW equation using the Exp-function method.
Computers & Mathematics with Applications, 2009

A data-mining approach for product conceptualization in a web-based architecture.
Computers in Industry, 2009

An investigation into sustainable product conceptualization using a design knowledge hierarchy and Hopfield network.
Computers & Industrial Engineering, 2009

Prequips - an extensible software platform for integration, visualization and analysis of LC-MS/MS proteomics data.
Bioinformatics, 2009

A stakeholder-oriented innovative product conceptualization strategy based on fuzzy integrals.
Advanced Engineering Informatics, 2009

An Opportunistic Approach to Enhance the Geo-graphical Source Routing Protocol for Vehicular Ad hoc Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Identification and Authentication in Large-Scale Storage Systems.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Why Anti-Virus Products Slow Down Your Machine?
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Cast Shadow Removal Using Time and Exposure Varying Images.
Proceedings of the Seventh International Conference on Advances in Pattern Recognition, 2009

Behavioural GP diversity for adaptive stock selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Efficient event-based resource discovery.
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, 2009

Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing.
Proceedings of the Complex Sciences, 2009

2008
An investigation into dynamic yard crane deployment and comparisons between hill-climbing and best-first-search algorithms.
IJCAT, 2008

A supply-chain-oriented business process reengineering strategy for on-demand new product development.
IJCAT, 2008

A berth allocation strategy using heuristics algorithm and simulation optimisation.
IJCAT, 2008

Revealing Packed Malware.
IEEE Security & Privacy, 2008

Soliciting customer requirements for product redesign based on picture sorts and ART2 neural network.
Expert Syst. Appl., 2008

An in-process customer utility prediction system for product conceptualisation.
Expert Syst. Appl., 2008

An integration of bidding-oriented product conceptualization and supply chain formation.
Computers in Industry, 2008

A class of portfolio selection with a four-factor futures price model.
Annals OR, 2008

ASCSS: An Automatic Service Composition Approach Based on Service Similarity.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

Learning to optimize profits beats predicting returns -: comparing techniques for financial portfolio optimisation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Ultra high frequency financial data.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
Comparison of Dimmable Electromagnetic and Electronic Ballast Systems - An Assessment on Energy Efficiency and Lifetime.
IEEE Trans. Industrial Electronics, 2007

Multi-period semi-variance portfolio selection: Model and numerical solution.
Applied Mathematics and Computation, 2007

An analytical flow control scheme for real-time traffic in wireless mesh network: from theoretic model to practical mechanism.
Proceedings of the 4th International Conference on Mobile Technology, 2007

A Clustering-Based Channel Assignment Algorithm and Routing Metric for Multi-channel Wireless Mesh Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

MEMO: An Applied Wireless Mesh Network with Client Support and Mobility Management.
Proceedings of the Global Communications Conference, 2007

Evolving robust GP solutions for hedge fund stock selection in emerging markets.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Diverse committees vote for dependable profits.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Model Checking of Computer-Based Systems.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

A Logic for Flow Event Structures.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
A study of bidding-oriented collaborative product conceptualization.
Int. J. Computer Integrated Manufacturing, 2006

Description logics for an autonomic IDS event analysis system.
Computer Communications, 2006

Product concept generation and selection using sorting technique and fuzzy c-means algorithm.
Computers & Industrial Engineering, 2006

An investigation into affective design using sorting technique and Kohonen self-organising map.
Advances in Engineering Software, 2006

Integrating web 2D and 3D technologies for architectural visualization: applications of SVG and X3D/VRML in environmental behavior simulation.
Proceedings of the Proceeding of the Eleventh International Conference on 3D Web Technology, 2006

Wireless Multi-hop Network Scenario Emulation with MinMax Error.
Proceedings of the LCN 2006, 2006

Behavioural GP diversity for dynamic environments: an application in hedge fund investment.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

2005
A QFD-enabled product conceptualisation approach via design knowledge hierarchy and RCE neural network.
Knowl.-Based Syst., 2005

Network Attack Scenarios Extraction and Categorization by Mining IDS Alert Streams.
J. UCS, 2005

PDCS - a product definition and customisation system for product concept development.
Expert Syst. Appl., 2005

A Web-enabled product definition and customization system for product conceptualization.
Expert Systems, 2005

Learning the Behavior of Users in a Public Space through Video Tracking.
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005

GCMPR: Gateway-Centric Multi-path Routing for Internet Connectivity of Wireless Mobile Ad Hoc Network.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Frame-based attack representation and real-time first order logic automatic reasoning.
Proceedings of the ITRE 2005, 2005

Cross-Layer Flow Control Based on Path Capacity Prediction for Multi-hop Ad Hoc Network.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Anycast Extensions to OSPFv3.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks.
Proceedings of IEEE International Conference on Communications, 2005

Measuring the Histogram Feature Vector for Anomaly Network Traffic.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Rehabilitation Guidance System using Multi-Layer Feed-Forward Neural Networks.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005

2003
Numerical schemes for Hamilton-Jacobi equations on unstructured meshes.
Numerische Mathematik, 2003

A Formal Specification and Method for MAS as a Distributed System.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

2002
An investigation on a prototype customer-oriented information system for product concept development.
Computers in Industry, 2002

Web-enabled Customer-oriented Product Concept Formation via Laddering Technique and Kohonen Association.
Concurrent Engineering: R&A, 2002

An integrated approach to the elicitation of customer requirements for engineering design using picture sorts and fuzzy evaluation.
AI EDAM, 2002

A strategy for acquiring customer requirement patterns using laddering technique and ART2 neural network.
Advanced Engineering Informatics, 2002

2001
A Radial Basis Function Neural Network Multicultural Factors Evaluation Engine For Product Concept Development.
Expert Systems, 2001


  Loading...